Ans .

A


  1. Explanation :

    Team-based development in PowerCenter facilitates collaboration across functional teams, such as development, quality assurance, and production administration, or across geographically disparate teams. This article describes frequently asked questions regarding team-based development in PowerCenter




Ans .

C





Ans .

A





Ans .

B





Ans .

A


  1. Explanation :Refactoring is "changing the structure of a program so that the functionality is not changed"




Ans .

C


  1. Explanation :Spoofing, in general, is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver. Spoofing is most prevalent in communication mechanisms that lack a high level of security.



Ans .

D




Ans .

B


  1. Explanation :Set of words that are deemed irrelevant, even though they may appear frequently. E.g., a, the, of, for, to, with, etc.If you equip your search engine with a stop list containing a few such common words, you can decrease the full-text index size by about 20%.



Ans .

D


  1. Explanation : A thread can post a message to its own message queue or to the queue of another thread by using the PostMessage or PostThreadMessage function



Ans .

A




Ans .

B


  1. Explanation :Eulers Formula for Planar Graphs



Ans .

A.


  1. Explanation :As there is no edge that connects vertices of same set bipartite graph is 2 colourable.



Ans .

D

  1. Explanation :

    As 9*9*8*7=4536




Ans .

B





Ans .

'B'.


  1. Explanation :

    As a context-free grammar G is said to be in Chomsky normal form (first described by Noam Chomsky) if all of its production rules are of the form: A -> BC, or A ->a, or S ->e, where A, B, and C are nonterminal symbols, a is a terminal symbol (a symbol that represents a constant value), S is the start symbol, and e denotes the empty string.



Ans .

B




Ans .

A



  1. Explanation : Parallel-to-serial conversion is normally accomplished by the use of a counter to provide a binary sequence for the data-select inputs of a multiplexer



Ans .

B or D.


  1. Explanation : NOR Gate. For inputs A and B, output Y of NOR gate is Y =complement of (A+B). Now for single input, let A = B Y = complement of A+A =complement of A Hence for input A, output is toggled.



Ans .

C.


  1. Explanation :

    2^8=256



Ans .

C.


  1. Explanation :Positional notation is where there is use of the same symbol for the different orders of magnitude.




Ans .

D.


  1. Explanation : C language uses 4 storage classes, namely: auto, extern, ststic and register..




Ans .

A





Ans .

C





Ans .

A.


  1. Explanation : Any programming language in which programs and data are essentially interchangeable are called as an extensible language




Ans .

D.


  1. Explanation : A virtual function is a member function that you expect to be redefined in derived classes. When you refer to a derived class object using a pointer or a reference to the base class, you can call a virtual function for that object and execute the derived class's version of the function.




Ans .

C





Ans .

B.


  1. Explanation :The Referred table is called the parent table while the table which refers other table is called child table where child table depends on its parent using parent's primary key for the reference.




Ans .

A





Ans .

D





Ans .

A





Ans .

B


  1. Explanation :Abstract Data type (ADT) is a type (or class) for objects whose behavior is defined by a set of value and a set of operations. The definition of ADT only mentions what operations are to be performed but not how these operations will be implemented. It does not specify how data will be organized in memory and what algorithms will be used for implementing the operations.




Ans .

A


  1. Explanation :Breadth First Search (BFS) algorithm traverses a graph in a breadthward motion and uses a queue to remember to get the next vertex to start a search, when a dead end occurs in any iteration.




Ans .

B


  1. Explanation :Root node os the only node in tree which doesn't have any ancestor.




Ans .

A





Ans .

A


  1. Explanation :Time comlexity to merge 2 sorted lists is O(m+n), where m- number of elements in 1st list and n- number of elements in 2nd list. Here there are 4 such sorted lists so time complexity will be O(50+10+25+15)= O(100)




Ans .

A





Ans .

D





Ans .

B


  1. Explanation :Sliding window protocols are used where reliable in-order delivery of packets is required and Connection oriented protocols assure reliability.




Ans .

D





Ans .

B


  1. Explanation :SMTP as, the client who wants to send the mail opens a TCP connection to the SMTP server and then sends the mail across the connection. The SMTP server is always on listening mode.




Ans .

B


  1. Explanation :

    START, END, BYTE, WORD, RESB, RESW. These statements are not translated into machine instructions.Instead, they provide instructions to the assembler itself.




Ans .

B





Ans .

D





Ans .

B


  1. Explanation :

    Lisp was used as the implementation of the programming language Micro Planner which was used in the famous AI system SHRDLU




Ans .

C


  1. Explanation :

    (1+5)(3-2)+

    15+32-+




Ans .

B


  1. Explanation :

    The page table is the full list of pages, whether mapped or unmapped - so there are 256 entries in the page table, since there are 256 pages.




Ans .

C


  1. Explanation :

    The Banker's algorithm, sometimes referred to as the detection algorithm, is a resource allocation and deadlock avoidance algorithm developed by Edsger Dijkstra that tests for safety by simulating the allocation of predetermined maximum possible amounts of all resources, and then makes an "s-state" check to test for possible deadlock conditions for all other pending activities, before deciding whether allocation should be allowed to continue.




Ans .

A


  1. Explanation :

    Device or special files are used for device I/O on UNIX and Linux systems. They appear in a file system just like an ordinary file or a directory.




Ans .

B


  1. Explanation :

    As we modify a file, its date and time for the modification reflects.




Ans .

D


  1. Explanation :

    vi full-featured screen editor for modifying text files

    gcc GNU C compiler